Navigate to http://[Target IP]:8000, open the “Search & Reporting” application, and find through SPL searches against all data the password utilized during the PsExec activity. Enter it as your answer.
I have tried utilizing various edited queries based on the three sections of locating psexec activity. I don’t find anything related to passwords or usernames but i do find where I think the specific activity occurred. I am completely stuck. I have also read the articles attached at the start of the psexec section to no avail. Any tips would be greatly appreciated!
Like @sampaio.veiga has already pointed out, it is alot earlier than using the provided commands in the section. Remember SPL is able to take any keywords provided, so use the keywords stated in the question to streamline your search.